Courses from 1000+ universities
Two years after its first major layoff round, Coursera announces another, impacting 10% of its workforce.
600 Free Google Certifications
Artificial Intelligence
Web Development
Computer Networking
Introductory Human Physiology
Mechanics of Materials I: Fundamentals of Stress & Strain and Axial Loading
Philosophy, Science and Religion: Religion and Science
Organize and share your learning with Class Central Lists.
View our Lists Showcase
Explore Agnitio, a comprehensive tool for secure code review, offering checklists, guidance modules, and automated analysis to enhance software development security practices.
Explore offensive XSLT techniques, uncovering vulnerabilities in applications using XSLT engines. Learn systematic review methods to identify high-impact security risks.
Explore strategies for CISOs to enhance organizational security through understanding human behavior, influencing stakeholders, and effective communication in complex environments.
Explore time-based security with Winn Schwartau, covering risk measurement, protection mechanisms, and defensive strategies for effective cybersecurity management.
Explore cybersecurity challenges with experts discussing international cyber law, counterattacks, and the future of digital threats in this thought-provoking panel.
Explore advanced evasion techniques used by cybercriminals to bypass network security, their impact on corporate networks, and the challenges they pose to current security solutions.
Explore nonverbal human hacking techniques, including NLP, body language, and microexpressions, to understand how social engineers manipulate targets for easier access to companies.
Explore SCADA security challenges, attacks, and mitigation strategies. Learn about system components, protocols, and real-world implementations. Gain insights into effective security measures for critical infrastructure.
Explore NetflOSINT: Leveraging overlooked Netflow data for efficient network forensics. Learn extraction techniques, analysis methods, and tools to enhance threat hunting and intelligence gathering.
Uncover critical vulnerabilities in industrial remote access solutions using OpenVPN, potentially leading to remote code execution. Learn about the risks and implications for cybersecurity.
Discover social engineering tactics, real-world attacks, and protective strategies. Learn about OSINT techniques, vishing strategies, and methods to safeguard organizations against evolving threats in this eye-opening presentation.
Explore security vulnerabilities in GPS trackers, including traffic analysis, SMS configuration exploitation, protocol reverse engineering, and GPS signal spoofing. Learn about privacy risks and potential attack scenarios.
Explore a new defense evasion technique, Process Reimaging, exploiting Windows OS vulnerabilities to bypass endpoint security solutions like Windows Defender. Learn attack vectors, weaponization, and protection recommendations.
Explore advanced payload generation techniques for red team engagements, including bypassing endpoint protections and evading sandboxing through innovative methods like XML stylesheets and COM.
Explore dynamic .NET runtime access using Python, bypassing PowerShell restrictions for stealthy offensive operations in Windows environments.
Get personalized course recommendations, track subjects and courses with reminders, and more.